Cybersecurity & Digital Protection
Last Updated: 24 April 2025
Our Commitment to Security
Nocturnal Capital Partners maintains the highest standards of cybersecurity to protect our investors, partners, and confidential information. As a private equity firm handling sensitive financial data, we employ multi-layered security measures and continuous monitoring to safeguard against evolving digital threats.
Recognising Digital Threats
2.1 Common Fraud Attempts
Phishing: Fraudulent communications impersonating legitimate entities to extract sensitive information
Business Email Compromise: Sophisticated attacks targeting financial transactions and confidential data
Credential Harvesting: Fake login portals designed to capture authentication details
Social Engineering: Psychological manipulation to gain unauthorised access to systems or information
2.2 Warning Signs
Unsolicited requests for passwords, financial information, or authentication codes
Urgent or threatening language demanding immediate action
Slight variations in email addresses or website URLs mimicking legitimate sources
Requests to bypass normal security protocols or verification processes
Our Security Framework
3.1 Technical Safeguards
Multi-Factor Authentication: Required for all system and portal access
End-to-End Encryption: All sensitive data encrypted in transit and at rest
Zero-Trust Architecture: Continuous verification of all access requests
Advanced Threat Protection: Real-time monitoring and threat detection systems
Secure Communication Channels: Encrypted platforms for all client communications
3.2 Operational Protocols
Regular Security Audits: Comprehensive internal and third-party assessments
Employee Training: Ongoing cybersecurity awareness and response training
Incident Response Planning: Documented procedures for security event management
Vendor Security Standards: Strict requirements for all third-party service providers
Physical Security Controls: Restricted access to systems and data storage
Your Role in Security
4.1 Best Practices for Digital Security
Use unique, complex passwords for each financial account
Enable multi-factor authentication wherever available
Verify the authenticity of unexpected requests through established channels
Keep systems and applications updated with the latest security patches
Monitor accounts regularly for unusual activity
4.2 Communication Protocols
We will never request sensitive information via unsolicited email
All official communications will originate from verified @nocturnalpe.com addresses
Secure portal access is required for sensitive document exchange
Verbal confirmation is required for significant transaction instructions
Incident Response
In the event of a suspected security incident:
5.1 Immediate Actions
Contact your relationship manager directly via verified phone numbers
Freeze affected accounts if unauthorised access is suspected
Preserve evidence of suspicious communications
5.2 Our Response Protocol
Immediate investigation and containment measures
Regulatory and law enforcement coordination where required
Transparent communication with affected parties
Comprehensive post-incident analysis and system hardening
Continuous Improvement
Cybersecurity requires ongoing adaptation to emerging threats. We maintain:
24/7 security monitoring and threat intelligence
Regular review and enhancement of security controls
Industry collaboration and information sharing
Compliance with evolving regulatory requirements
Contact and Reporting
For security concerns or suspected fraud:
Primary Contact: Your designated relationship managerEmail: security@nocturnalpe.com (for security-specific matters)
General Inquiries: info@nocturnalpe.com
Immediately report any suspicious communications claiming to represent Nocturnal Capital Partners.
Important: This document outlines our security framework but does not create additional legal obligations or modify existing agreements.
Specific security protocols are detailed in our investor documentation and are subject to periodic updates.